Friday, January 23, 2015

Wednesday, January 21, 2015

Metropolis

One man's fiction becomes anorther's reality


Comic book cell - DC Comics
In every land there are stone monuments to heroes  Some remain today                                             


 

Monday, January 19, 2015

The sum of morals

"I do"

Families run on love and money, if they don't run, they are on empty in either case

Saturday, January 17, 2015

Wednesday, January 14, 2015

Tampa at dusk

View of down town Tampa from the University of Tampa

Pastel


 
model



 
model


Orchestra

Wall-E

Pixar Animation Studios
a personal favorite

Tor

This is a Tor Exit Router
Most likely you are accessing this website because you had some issue with the traffic coming from this IP. This router is part of the Tor Anonymity Network, which is dedicated to providing privacy to people who need it most: average computer users. This router IP should be generating no other traffic, unless it has been compromised.
Tor sees use by many important segments of the population, including whistle blowers, journalists, Chinese dissidents skirting the Great Firewall and oppressive censorship, abuse victims, stalker targets, the US military, and law enforcement, just to name a few. While Tor is not designed for malicious computer users, it is true that they can use the network for malicious ends. In reality however, the actual amount of abuse is quite low. This is largely because criminals and hackers have significantly better access to privacy and anonymity than do the regular users whom they prey upon. Criminals can and do build, sell, and trade far larger and more powerful networks than Tor on a daily basis. Thus, in the mind of this operator, the social need for easily accessible censorship-resistant private, anonymous communication trumps the risk of unskilled bad actors, who are almost always more easily uncovered by traditional police work than by extensive monitoring and surveillance anyway.
In terms of applicable law, the best way to understand Tor is to consider it a network of routers operating as common carriers, much like the Internet backbone. However, unlike the Internet backbone routers, Tor routers explicitly do not contain identifiable routing information about the source of a packet, and no single Tor node can determine both the origin and destination of a given transmission.
As such, there is little the operator of this router can do to help you track the connection further. This router maintains no logs of any of the Tor traffic, so there is little that can be done to trace either legitimate or illegitimate traffic (or to filter one from the other). Attempts to seize this router will accomplish nothing.

source Wikipedia

 - see Wikipedia for active links below

Historical Silk Road

 

Wednesday, January 07, 2015

Christmas past

Tampa University

Temptation

Chuck's Blues


When the devil 
Comes a court’n 
He can hang 
Beauty 
On the threads 
Of a scarecrow 
Take your eyes 
Where they shouldn't go 
And walk you, walk you 
Out your door...



Yes! 
She’s a tempt’n 
N’ ain’t no scary crow 
Now c’mon, c’mon 
Where's the door?

God  made all things good and He also made evil - He made all things.   This piece from a previous post.  Its all mine, don't be tempted~  

Monday, January 05, 2015

Sunday, January 04, 2015

How's it hang'n

Arthur Ravenel Bridge Savanah
Ooops - not my shot

The next one is a favorite, and I shoot all this stuff unless conscience is lacking

Man watching a basketball game

 repeat blog entry

What if

God gave Moses the Ten Commandments on a hard drive
instead of stone tablets
Today we would be speaking Hebrew